{"id":1600,"date":"2022-05-31T16:22:29","date_gmt":"2022-05-31T16:22:29","guid":{"rendered":"https:\/\/law.temple.edu\/ilit\/?page_id=1600"},"modified":"2022-06-17T20:35:39","modified_gmt":"2022-06-17T20:35:39","slug":"digital-surveillance","status":"publish","type":"page","link":"https:\/\/law.temple.edu\/ilit\/issues\/digital-surveillance\/","title":{"rendered":"Digital Surveillance"},"content":{"rendered":"<style>#kt-layout-id_8d4cb2-24 > .kt-row-column-wrap{align-content:start;}:where(#kt-layout-id_8d4cb2-24 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}#kt-layout-id_8d4cb2-24 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var( --global-kb-row-default-top, 25px );padding-bottom:var( --global-kb-row-default-bottom, 25px );padding-top:100px;padding-bottom:100px;grid-template-columns:minmax(0, 2fr) minmax(0, 1fr);}#kt-layout-id_8d4cb2-24{background-image:url('https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/04\/20170127_PhiladelphiaStock_023-Web-Res-JPEG-150-DPI.jpg');background-size:cover;background-position:center center;background-attachment:scroll;background-repeat:no-repeat;}#kt-layout-id_8d4cb2-24 > .kt-row-layout-overlay{opacity:0.55;background-color:var(--global-palette3, #1A202C);}@media all and (max-width: 1024px){#kt-layout-id_8d4cb2-24 > .kt-row-column-wrap{grid-template-columns:minmax(0, 2fr) minmax(0, 1fr);}}@media all and (max-width: 767px){#kt-layout-id_8d4cb2-24 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style>\n<div class=\"wp-block-kadence-rowlayout alignfull\"><div id=\"kt-layout-id_8d4cb2-24\" class=\"kt-row-layout-inner kt-row-has-bg kt-layout-id_8d4cb2-24\"><div class=\"kt-row-layout-overlay kt-row-overlay-normal\"><\/div><div class=\"kt-row-column-wrap kt-has-2-columns kt-gutter-default kt-v-gutter-default kt-row-valign-top kt-row-layout-left-golden kt-tab-layout-inherit kt-m-colapse-left-to-right kt-mobile-layout-row kb-theme-content-width\"><style>.kadence-column_bee614-31 > .kt-inside-inner-col{border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;}.kadence-column_bee614-31 > .kt-inside-inner-col,.kadence-column_bee614-31 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column_bee614-31 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column_bee614-31 > .kt-inside-inner-col{flex-direction:column;}.kadence-column_bee614-31 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column_bee614-31 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column_bee614-31{position:relative;}@media all and (max-width: 1024px){.kadence-column_bee614-31 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column_bee614-31 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column inner-column-1 kadence-column_bee614-31\"><div class=\"kt-inside-inner-col\">\n<h1 class=\"has-theme-palette-9-color has-text-color wp-block-heading\">Digital Surveillance<\/h1>\n\n\n\n<h3 class=\"has-theme-palette-9-color has-text-color wp-block-heading\">Human &amp; Civil Rights, Digital Surveillance &amp; Emerging Technologies<\/h3>\n<\/div><\/div>\n\n\n<style>.kadence-column_89e2f1-c2 > .kt-inside-inner-col{border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;}.kadence-column_89e2f1-c2 > .kt-inside-inner-col,.kadence-column_89e2f1-c2 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column_89e2f1-c2 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column_89e2f1-c2 > .kt-inside-inner-col{flex-direction:column;}.kadence-column_89e2f1-c2 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column_89e2f1-c2 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column_89e2f1-c2{position:relative;}@media all and (max-width: 1024px){.kadence-column_89e2f1-c2 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column_89e2f1-c2 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column inner-column-2 kadence-column_89e2f1-c2\"><div class=\"kt-inside-inner-col\"><\/div><\/div>\n<\/div><\/div><\/div>\n\n\n<style>#kt-layout-id_90e081-cc > .kt-row-column-wrap{align-content:start;}:where(#kt-layout-id_90e081-cc > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}#kt-layout-id_90e081-cc > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var( --global-kb-row-default-top, 25px );padding-bottom:var( --global-kb-row-default-bottom, 25px );padding-top:50px;padding-bottom:50px;padding-left:0px;padding-right:0px;grid-template-columns:minmax(0, 1fr);}#kt-layout-id_90e081-cc > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){#kt-layout-id_90e081-cc > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){#kt-layout-id_90e081-cc > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style>\n<div class=\"wp-block-kadence-rowlayout alignnone\"><div id=\"kt-layout-id_90e081-cc\" class=\"kt-row-layout-inner kt-row-has-bg kt-layout-id_90e081-cc has-theme-palette-9-background-color\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-gutter-default kt-v-gutter-default kt-row-valign-top kt-row-layout-equal kt-tab-layout-inherit kt-m-colapse-left-to-right kt-mobile-layout-row kb-theme-content-width\"><style>.kadence-column_de097d-79 > .kt-inside-inner-col{border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;}.kadence-column_de097d-79 > .kt-inside-inner-col,.kadence-column_de097d-79 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column_de097d-79 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column_de097d-79 > .kt-inside-inner-col{flex-direction:column;}.kadence-column_de097d-79 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column_de097d-79 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column_de097d-79{position:relative;}@media all and (max-width: 1024px){.kadence-column_de097d-79 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column_de097d-79 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column inner-column-1 kadence-column_de097d-79\"><div class=\"kt-inside-inner-col\">\n<p>Networked technologies have evolved to afford an unprecedented capacity to track, influence and control people through digital means. The implications of this predicament dominate political, economic, and cultural discourse today. The same evolutionary pathway allowed a small number of powerful actors to disproportionately imagine, create and control the means and regulation of digital surveillance.&nbsp;<\/p>\n\n\n\n<p>From the cables and servers that make up the physical infrastructure of the internet to the design of facial or voice recognition algorithms, all digital technologies carry a range of possibilities &#8211; from promising to pernicious &#8211; for the future development and enjoyment of human rights. But the deployment of emerging technologies has not led to greater equality, more democratic access to knowledge, or safer and more inclusive societies &#8211; and where positive developments have emerged, these come at grave costs at the margins which often go undocumented or dismissed as acceptable in economies focused on efficiency and scale.&nbsp;<\/p>\n\n\n\n<p>In the future, the demand for effective accountability options for the creation and misuse of repressive technologies will grow as human rights advocates are increasingly empowered and supported in their work. That means finding new innovative ways to communicate and build solidarity across political borders, and investing in the creative use of investigative tools and legal advocacy to expand access to justice in this complex and evolving field.<\/p>\n<\/div><\/div>\n<\/div><\/div><\/div>\n\n\n<style>#kt-layout-id_de903e-53 > .kt-row-column-wrap{align-content:start;}:where(#kt-layout-id_de903e-53 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}#kt-layout-id_de903e-53 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var( --global-kb-row-default-top, 25px );padding-bottom:var( --global-kb-row-default-bottom, 25px );padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}#kt-layout-id_de903e-53 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){#kt-layout-id_de903e-53 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){#kt-layout-id_de903e-53 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style>\n<div class=\"wp-block-kadence-rowlayout alignnone\"><div id=\"kt-layout-id_de903e-53\" class=\"kt-row-layout-inner kt-row-has-bg kt-layout-id_de903e-53 has-theme-palette-9-background-color\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-gutter-default kt-v-gutter-default kt-row-valign-top kt-row-layout-equal kt-tab-layout-inherit kt-m-colapse-left-to-right kt-mobile-layout-row kb-theme-content-width\"><style>.kadence-column_b20363-9c > .kt-inside-inner-col{border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;}.kadence-column_b20363-9c > .kt-inside-inner-col,.kadence-column_b20363-9c > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column_b20363-9c > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column_b20363-9c > .kt-inside-inner-col{flex-direction:column;}.kadence-column_b20363-9c > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column_b20363-9c > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column_b20363-9c{position:relative;}@media all and (max-width: 1024px){.kadence-column_b20363-9c > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column_b20363-9c > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column inner-column-1 kadence-column_b20363-9c\"><div class=\"kt-inside-inner-col\"><style>.kb-posts-id-_b3512c-e2 .kb-post-list-item{display:grid;}<\/style><ul class=\"wp-block-kadence-posts kb-posts kadence-posts-list kb-posts-id-_b3512c-e2 content-wrap grid-cols kb-posts-style-boxed grid-sm-col-2 grid-lg-col-3 item-image-style-above\"><li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-2769 post type-post status-publish format-standard has-post-thumbnail hentry category-blog category-digital-surveillance category-public-interest-tech category-students tag-authoritatianism tag-blog tag-censorship tag-digital-security tag-digital-surveillance tag-doxxing tag-government-shutdown tag-international-law tag-social-media tag-voter-fraud\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/\" aria-label=\"Digital Darkness: How Governments Use Digital Repression to Silence Dissent\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"602\" src=\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo-768x602.jpg\" class=\"attachment-medium_large size-medium_large wp-post-image\" alt=\"Digital Darkness: How Governments Use Digital Repression to Silence Dissent\" srcset=\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo-768x602.jpg 768w, https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo-300x235.jpg 300w, https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo-1024x803.jpg 1024w, https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo-1320x1035.jpg 1320w, https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2026\/01\/Digital-Darkness-Photo.jpg 1500w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t\t<div class=\"entry-taxonomies\">\n\t\t<span class=\"category-links term-links category-style-normal\">\n\t\t\t<a href=\"https:\/\/law.temple.edu\/ilit\/category\/blog\/\" class=\"category-link-blog\" rel=\"tag\">Blog<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/digital-surveillance\/\" class=\"category-link-digital-surveillance\" rel=\"tag\">Digital Surveillance<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/public-interest-tech\/\" class=\"category-link-public-interest-tech\" rel=\"tag\">Public Interest Tech<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/students\/\" class=\"category-link-students\" rel=\"tag\">Students<\/a>\t\t<\/span>\n\t<\/div><!-- .entry-taxonomies -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/\" rel=\"bookmark\">Digital Darkness: How Governments Use Digital Repression to Silence Dissent<\/a><\/h2><\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>By: Atoosa Haghani, LAW \u201827 It begins with silence. Not the absence of noise, but a forced muting, of&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/law.temple.edu\/ilit\/digital-darkness-how-governments-use-digital-repression-to-silence-dissent\/\" class=\"post-more-link\">\n\t\t\t\t\tRead More<span class=\"screen-reader-text\"> Digital Darkness: How Governments Use Digital Repression to Silence Dissent<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continue<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-2462 post type-post status-publish format-standard has-post-thumbnail hentry category-collaboration category-digital-surveillance category-publications tag-a2j tag-access-to-justice tag-clinic-report tag-digital-id tag-digital-identity tag-digital-security\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/law.temple.edu\/ilit\/a-model-governance-framework-analysis-of-kenyas-maisha-namba\/\" aria-label=\"A Model Governance Framework Analysis of Kenya\u2019s Maisha Namba\u00a0\u00a0\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"596\" src=\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2024\/12\/FireShot-Webpage-Capture-196-Digital-Legal-ID-Governance-www.governance4id.org_.jpg\" class=\"attachment-medium_large size-medium_large wp-post-image\" alt=\"A Model Governance Framework Analysis of Kenya\u2019s Maisha Namba\u00a0\u00a0\" \/>\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t\t<div class=\"entry-taxonomies\">\n\t\t<span class=\"category-links term-links category-style-normal\">\n\t\t\t<a href=\"https:\/\/law.temple.edu\/ilit\/category\/collaboration\/\" class=\"category-link-collaboration\" rel=\"tag\">Collaboration<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/digital-surveillance\/\" class=\"category-link-digital-surveillance\" rel=\"tag\">Digital Surveillance<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/publications\/\" class=\"category-link-publications\" rel=\"tag\">Publications<\/a>\t\t<\/span>\n\t<\/div><!-- .entry-taxonomies -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/law.temple.edu\/ilit\/a-model-governance-framework-analysis-of-kenyas-maisha-namba\/\" rel=\"bookmark\">A Model Governance Framework Analysis of Kenya\u2019s Maisha Namba\u00a0\u00a0<\/a><\/h2><\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>Authors: Kiko Galpin, Jackie Jaques, Lara Ormiston, and Valerie Wilson An Access to Justice Clinic Report | August 2024&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/law.temple.edu\/ilit\/a-model-governance-framework-analysis-of-kenyas-maisha-namba\/\" class=\"post-more-link\">\n\t\t\t\t\tRead More<span class=\"screen-reader-text\"> A Model Governance Framework Analysis of Kenya\u2019s Maisha Namba\u00a0\u00a0<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continue<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-2453 post type-post status-publish format-standard has-post-thumbnail hentry category-collaboration category-digital-surveillance category-publications tag-digital-identity tag-digital-security tag-digital-surveillance tag-nist\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/law.temple.edu\/ilit\/comments-on-draft-of-the-nist-digital-identity-guidelines-special-publication-800-63-4\/\" aria-label=\"Comments on Draft of the NIST Digital Identity Guidelines, Special Publication 800-63-4\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2024\/12\/pexels-jakubzerdzicki-20528510.jpg\" class=\"attachment-medium_large size-medium_large wp-post-image\" alt=\"Comments on Draft of the NIST Digital Identity Guidelines, Special Publication 800-63-4\" \/>\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t\t<div class=\"entry-taxonomies\">\n\t\t<span class=\"category-links term-links category-style-normal\">\n\t\t\t<a href=\"https:\/\/law.temple.edu\/ilit\/category\/collaboration\/\" class=\"category-link-collaboration\" rel=\"tag\">Collaboration<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/digital-surveillance\/\" class=\"category-link-digital-surveillance\" rel=\"tag\">Digital Surveillance<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/publications\/\" class=\"category-link-publications\" rel=\"tag\">Publications<\/a>\t\t<\/span>\n\t<\/div><!-- .entry-taxonomies -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/law.temple.edu\/ilit\/comments-on-draft-of-the-nist-digital-identity-guidelines-special-publication-800-63-4\/\" rel=\"bookmark\">Comments on Draft of the NIST Digital Identity Guidelines, Special Publication 800-63-4<\/a><\/h2><\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>In April 2023, we partnered with the Digital Welfare State &amp; Human Rights Project at the Center in submitted&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/law.temple.edu\/ilit\/comments-on-draft-of-the-nist-digital-identity-guidelines-special-publication-800-63-4\/\" class=\"post-more-link\">\n\t\t\t\t\tRead More<span class=\"screen-reader-text\"> Comments on Draft of the NIST Digital Identity Guidelines, Special Publication 800-63-4<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continue<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-2449 post type-post status-publish format-standard has-post-thumbnail hentry category-collaboration category-digital-surveillance category-publications tag-digital-identity tag-digital-security tag-digital-surveillance tag-nist\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/law.temple.edu\/ilit\/shaping-digital-identity-standards\/\" aria-label=\"Shaping Digital Identity Standards\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"519\" height=\"484\" src=\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2024\/12\/comp.jpg\" class=\"attachment-medium_large size-medium_large wp-post-image\" alt=\"Shaping Digital Identity Standards\" \/>\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t\t<div class=\"entry-taxonomies\">\n\t\t<span class=\"category-links term-links category-style-normal\">\n\t\t\t<a href=\"https:\/\/law.temple.edu\/ilit\/category\/collaboration\/\" class=\"category-link-collaboration\" rel=\"tag\">Collaboration<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/digital-surveillance\/\" class=\"category-link-digital-surveillance\" rel=\"tag\">Digital Surveillance<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/publications\/\" class=\"category-link-publications\" rel=\"tag\">Publications<\/a>\t\t<\/span>\n\t<\/div><!-- .entry-taxonomies -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/law.temple.edu\/ilit\/shaping-digital-identity-standards\/\" rel=\"bookmark\">Shaping Digital Identity Standards<\/a><\/h2><\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>An Explainer and Recommendations on Technical Standard-Setting for Digital Identity Systems. In April 2023, we submitted comments to the&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/law.temple.edu\/ilit\/shaping-digital-identity-standards\/\" class=\"post-more-link\">\n\t\t\t\t\tRead More<span class=\"screen-reader-text\"> Shaping Digital Identity Standards<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continue<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-2443 post type-post status-publish format-standard has-post-thumbnail hentry category-digital-surveillance category-publications tag-cybercrime\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/law.temple.edu\/ilit\/united-nation-cybercrime-treaty-negotiations-fifth-session\/\" aria-label=\"United Nation Cybercrime Treaty Negotiations &#8211; Fifth session\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2024\/12\/mathias-reding-yfXhqAW5X0c-unsplash1.jpg\" class=\"attachment-medium_large size-medium_large wp-post-image\" alt=\"outside corridor leading to the front door of the UN, with country flags lining both sides of the walkway\" \/>\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t\t<div class=\"entry-taxonomies\">\n\t\t<span class=\"category-links term-links category-style-normal\">\n\t\t\t<a href=\"https:\/\/law.temple.edu\/ilit\/category\/digital-surveillance\/\" class=\"category-link-digital-surveillance\" rel=\"tag\">Digital Surveillance<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/publications\/\" class=\"category-link-publications\" rel=\"tag\">Publications<\/a>\t\t<\/span>\n\t<\/div><!-- .entry-taxonomies -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/law.temple.edu\/ilit\/united-nation-cybercrime-treaty-negotiations-fifth-session\/\" rel=\"bookmark\">United Nation Cybercrime Treaty Negotiations &#8211; Fifth session<\/a><\/h2><\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>The Tradition of Human Rights Limitation Conditions and Safeguards in International Law\u00a0 INTRODUCTION&nbsp; This document is designed to inform&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/law.temple.edu\/ilit\/united-nation-cybercrime-treaty-negotiations-fifth-session\/\" class=\"post-more-link\">\n\t\t\t\t\tRead More<span class=\"screen-reader-text\"> United Nation Cybercrime Treaty Negotiations &#8211; Fifth session<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continue<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-2082 post type-post status-publish format-standard has-post-thumbnail hentry category-alumni category-cybernorms category-digital-surveillance category-events category-public-interest-tech category-students\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/law.temple.edu\/ilit\/sovereign-identity-crisis-state-self-and-collective-in-a-digital-age-november-17-2022\/\" aria-label=\"Sovereign Identity Crisis: State, Self, and Collective in a Digital Age &#8211; November 17, 2022\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"432\" src=\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/09\/20181205_Water_aquarium_019-Web-Res-JPEG-150-DPI-768x432.jpg\" class=\"attachment-medium_large size-medium_large wp-post-image\" alt=\"Abstract water movement image\" srcset=\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/09\/20181205_Water_aquarium_019-Web-Res-JPEG-150-DPI-768x432.jpg 768w, https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/09\/20181205_Water_aquarium_019-Web-Res-JPEG-150-DPI-300x169.jpg 300w, https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/09\/20181205_Water_aquarium_019-Web-Res-JPEG-150-DPI-1024x576.jpg 1024w, https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/09\/20181205_Water_aquarium_019-Web-Res-JPEG-150-DPI-1536x864.jpg 1536w, https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/09\/20181205_Water_aquarium_019-Web-Res-JPEG-150-DPI-2048x1152.jpg 2048w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t\t<div class=\"entry-taxonomies\">\n\t\t<span class=\"category-links term-links category-style-normal\">\n\t\t\t<a href=\"https:\/\/law.temple.edu\/ilit\/category\/alumni\/\" class=\"category-link-alumni\" rel=\"tag\">Alumni<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/cybernorms\/\" class=\"category-link-cybernorms\" rel=\"tag\">Cybernorms<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/digital-surveillance\/\" class=\"category-link-digital-surveillance\" rel=\"tag\">Digital Surveillance<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/events\/\" class=\"category-link-events\" rel=\"tag\">Events<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/public-interest-tech\/\" class=\"category-link-public-interest-tech\" rel=\"tag\">Public Interest Tech<\/a> | <a href=\"https:\/\/law.temple.edu\/ilit\/category\/students\/\" class=\"category-link-students\" rel=\"tag\">Students<\/a>\t\t<\/span>\n\t<\/div><!-- .entry-taxonomies -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/law.temple.edu\/ilit\/sovereign-identity-crisis-state-self-and-collective-in-a-digital-age-november-17-2022\/\" rel=\"bookmark\">Sovereign Identity Crisis: State, Self, and Collective in a Digital Age &#8211; November 17, 2022<\/a><\/h2><\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>Sovereign Identity Crisis: State, Self, and Collective in a Digital Age Event Hosted by iLIT and the Temple Law&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t\t\t<div class=\"entry-actions\">\n\t\t\t<p class=\"more-link-wrap\">\n\t\t\t\t<a href=\"https:\/\/law.temple.edu\/ilit\/sovereign-identity-crisis-state-self-and-collective-in-a-digital-age-november-17-2022\/\" class=\"post-more-link\">\n\t\t\t\t\tRead More<span class=\"screen-reader-text\"> Sovereign Identity Crisis: State, Self, and Collective in a Digital Age &#8211; November 17, 2022<\/span><span class=\"kadence-svg-iconset svg-baseline\"><svg aria-hidden=\"true\" class=\"kadence-svg-icon kadence-arrow-right-alt-svg\" fill=\"currentColor\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"27\" height=\"28\" viewBox=\"0 0 27 28\"><title>Continue<\/title><path d=\"M27 13.953c0 0.141-0.063 0.281-0.156 0.375l-6 5.531c-0.156 0.141-0.359 0.172-0.547 0.094-0.172-0.078-0.297-0.25-0.297-0.453v-3.5h-19.5c-0.281 0-0.5-0.219-0.5-0.5v-3c0-0.281 0.219-0.5 0.5-0.5h19.5v-3.5c0-0.203 0.109-0.375 0.297-0.453s0.391-0.047 0.547 0.078l6 5.469c0.094 0.094 0.156 0.219 0.156 0.359v0z\"><\/path>\n\t\t\t<\/svg><\/span>\t\t\t\t<\/a>\n\t\t\t<\/p>\n\t\t<\/div><!-- .entry-actions -->\n\t\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<\/ul><\/div><\/div>\n<\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Digital Surveillance Human &amp; Civil Rights, Digital Surveillance &amp; Emerging Technologies Networked technologies have evolved to afford an unprecedented capacity to track, influence and control people through digital means. The implications of this predicament dominate political, economic, and cultural discourse today. The same evolutionary pathway allowed a small number of powerful actors to disproportionately imagine,&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":1229,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"categories":[],"tags":[],"class_list":["post-1600","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital Surveillance - Temple iLIT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/law.temple.edu\/ilit\/issues\/digital-surveillance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Surveillance - Temple iLIT\" \/>\n<meta property=\"og:description\" content=\"Digital Surveillance Human &amp; Civil Rights, Digital Surveillance &amp; Emerging Technologies Networked technologies have evolved to afford an unprecedented capacity to track, influence and control people through digital means. The implications of this predicament dominate political, economic, and cultural discourse today. The same evolutionary pathway allowed a small number of powerful actors to disproportionately imagine,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/law.temple.edu\/ilit\/issues\/digital-surveillance\/\" \/>\n<meta property=\"og:site_name\" content=\"Temple iLIT\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-17T20:35:39+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/issues\/digital-surveillance\/\",\"url\":\"https:\/\/law.temple.edu\/ilit\/issues\/digital-surveillance\/\",\"name\":\"Digital Surveillance - Temple iLIT\",\"isPartOf\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/#website\"},\"datePublished\":\"2022-05-31T16:22:29+00:00\",\"dateModified\":\"2022-06-17T20:35:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/issues\/digital-surveillance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/law.temple.edu\/ilit\/issues\/digital-surveillance\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/issues\/digital-surveillance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"ISSUES\",\"item\":\"https:\/\/law.temple.edu\/ilit\/issues\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital Surveillance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#website\",\"url\":\"https:\/\/law.temple.edu\/ilit\/\",\"name\":\"Temple iLIT\",\"description\":\"Institute for Law, Innovation &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/law.temple.edu\/ilit\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#organization\",\"name\":\"Temple iLIT\",\"url\":\"https:\/\/law.temple.edu\/ilit\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/08\/cropped-iLIT-logo-1.png\",\"contentUrl\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/08\/cropped-iLIT-logo-1.png\",\"width\":1465,\"height\":704,\"caption\":\"Temple iLIT\"},\"image\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital Surveillance - Temple iLIT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/law.temple.edu\/ilit\/issues\/digital-surveillance\/","og_locale":"en_US","og_type":"article","og_title":"Digital Surveillance - Temple iLIT","og_description":"Digital Surveillance Human &amp; Civil Rights, Digital Surveillance &amp; Emerging Technologies Networked technologies have evolved to afford an unprecedented capacity to track, influence and control people through digital means. The implications of this predicament dominate political, economic, and cultural discourse today. The same evolutionary pathway allowed a small number of powerful actors to disproportionately imagine,...","og_url":"https:\/\/law.temple.edu\/ilit\/issues\/digital-surveillance\/","og_site_name":"Temple iLIT","article_modified_time":"2022-06-17T20:35:39+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/law.temple.edu\/ilit\/issues\/digital-surveillance\/","url":"https:\/\/law.temple.edu\/ilit\/issues\/digital-surveillance\/","name":"Digital Surveillance - Temple iLIT","isPartOf":{"@id":"https:\/\/law.temple.edu\/ilit\/#website"},"datePublished":"2022-05-31T16:22:29+00:00","dateModified":"2022-06-17T20:35:39+00:00","breadcrumb":{"@id":"https:\/\/law.temple.edu\/ilit\/issues\/digital-surveillance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/law.temple.edu\/ilit\/issues\/digital-surveillance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/law.temple.edu\/ilit\/issues\/digital-surveillance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"ISSUES","item":"https:\/\/law.temple.edu\/ilit\/issues\/"},{"@type":"ListItem","position":2,"name":"Digital Surveillance"}]},{"@type":"WebSite","@id":"https:\/\/law.temple.edu\/ilit\/#website","url":"https:\/\/law.temple.edu\/ilit\/","name":"Temple iLIT","description":"Institute for Law, Innovation &amp; Technology","publisher":{"@id":"https:\/\/law.temple.edu\/ilit\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/law.temple.edu\/ilit\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/law.temple.edu\/ilit\/#organization","name":"Temple iLIT","url":"https:\/\/law.temple.edu\/ilit\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/law.temple.edu\/ilit\/#\/schema\/logo\/image\/","url":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/08\/cropped-iLIT-logo-1.png","contentUrl":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/08\/cropped-iLIT-logo-1.png","width":1465,"height":704,"caption":"Temple iLIT"},"image":{"@id":"https:\/\/law.temple.edu\/ilit\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/pages\/1600","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/comments?post=1600"}],"version-history":[{"count":3,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/pages\/1600\/revisions"}],"predecessor-version":[{"id":1759,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/pages\/1600\/revisions\/1759"}],"up":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/pages\/1229"}],"wp:attachment":[{"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/media?parent=1600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/categories?post=1600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/tags?post=1600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}